### [CVE-2015-6564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. ### POC #### Reference - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html #### Github - https://github.com/CyCognito/manual-detection - https://github.com/Live-Hack-CVE/CVE-2015-6564 - https://github.com/bigb0x/CVE-2024-6387 - https://github.com/bigb0x/OpenSSH-Scanner - https://github.com/ryanalieh/openSSH-scanner - https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough